How to Work with Honest but Curious Judges? (Preliminary Report)
نویسندگان
چکیده
The three-judges protocol, recently advocated by Mclver and Morgan as an example of stepwise refinement of security protocols, studies how to securely compute the majority function to reach a final verdict without revealing each individual judge’s decision. We extend their protocol in two different ways for an arbitrary number of 2n+1 judges. The first generalisation is inherently centralised, in the sense that it requires a judge as a leader who collects information from others, computes the majority function, and announces the final result. A different approach can be obtained by slightly modifying the well-known dining cryptographers protocol, however it reveals the number of votes rather than the final verdict. We define a notion of conditional anonymity in order to analyse these two solutions. Both of them have been checked in the model checker MCMAS.
منابع مشابه
عدالت نفسانی قاضی در فقه امامیه و حقوق ایران
Abstract: Justice, in the Islamic worldview, is one of the most important virtues a judge should possess. Particularly, Article 158 of the Constitution of the Islamic Republic of Iran provides that one of the duties of the president of the Judiciary is the requitment of most qualified, generous, honest and authentic judges. Also, in accordance with Article 163, the terms of office and the gene...
متن کاملOn the Relation Between the Ideal Cipher and the Random Oracle Models
The Random Oracle Model and the Ideal Cipher Model are two of the most popular idealized models in cryptography. It is a fundamentally important practical and theoretical problem to compare the relative strengths of these models and to see how they relate to each other. Recently, Coron et al. [8] proved that one can securely instantiate a random oracle in the ideal cipher model. In this paper, ...
متن کاملMulti-authority attribute-based encryption with honest-but-curious central authority
An attribute based encryption scheme capable of handling multiple authorities was recently proposed by Chase. The scheme is built upon a single-authority attribute based encryption scheme presented earlier by Sahai and Waters. Chase’s construction uses a trusted central authority that is inherently capable of decrypting arbitrary ciphertexts created within the system. We present a multi-authori...
متن کاملSecurity and Privacy in Smart Grid Demand Response Systems
Various research efforts have focussed on the security and privacy concerns arising from the introduction of smart energy meters. However, in addition to smart metering, the ultimate vision of the smart grid includes bi-directional communication between consumers and suppliers to facilitate certain types of Demand Response (DR) strategies such as demand bidding (DR-DB). In this work we explore ...
متن کاملTwo-Party Quantum Protocols Do Not Compose Securely Against Honest-But-Curious Adversaries
In this paper, we build upon the model of two-party quantum computation introduced by Salvail et al. [SSS09] and show that in this model, only trivial correct two-party quantum protocols are weakly selfcomposable. We do so by defining a protocol Π calling any non-trivial sub-protocol π N times and showing that there is a quantum honest-but-curious strategy that cannot be modeled by acting local...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009